Improper Input Validation | |
Incorrect Authorization | |
Information Exposure Through Log Files | |
Improper Encoding or Escaping of Output | |
CVE-2023-5764 | |
Directory Traversal | |
CVE-2023-4237 | |
CVE-2022-3697 | |
Arbitrary Command Injection | |
Information Exposure | |
Information Exposure Through Log Files | <2.10.7+merged+base+2.10.8+dfsg-1 |
Information Exposure | <2.10.7+merged+base+2.10.8+dfsg-1 |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Improper Verification of Cryptographic Signature | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Exposure of Resource to Wrong Sphere | |
Use of Insufficiently Random Values | |
Directory Traversal | |
Arbitrary Code Injection | |
Exposure of Resource to Wrong Sphere | |
Information Exposure Through Log Files | |
Information Exposure | |
Incorrect Permission Assignment for Critical Resource | |
Directory Traversal | |
Exposure of Resource to Wrong Sphere | |
OS Command Injection | |
Information Exposure | |
Directory Traversal | |
Arbitrary Argument Injection | |
Information Exposure | |
Always-Incorrect Control Flow Implementation | |
OS Command Injection | |
Externally Controlled Reference to a Resource in Another Sphere | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure Through Log Files | |
Information Exposure | |
Improper Input Validation | |
Information Exposure | |
Directory Traversal | |
Information Exposure | |
Missing Encryption of Sensitive Data | |
Untrusted Search Path | |
Improper Input Validation | |
Improper Input Validation | |
Information Exposure Through Log Files | |
Arbitrary Command Injection | |
Key Management Errors | |
Insufficiently Protected Credentials | |
Improper Input Validation | |
Arbitrary Code Injection | |
Arbitrary Code Injection | |
Insufficiently Protected Credentials | |
Information Exposure | |
Improper Input Validation | |
Arbitrary Code Injection | |
Improper Input Validation | |
Key Management Errors | |
Improper Input Validation | |
Information Exposure Through Log Files | |
Improper Input Validation | |
Link Following | |
Link Following | |
Insufficient Verification of Data Authenticity | |
Access Restriction Bypass | |